{"id":290,"date":"2019-09-02T13:58:47","date_gmt":"2019-09-02T12:58:47","guid":{"rendered":"https:\/\/research.reading.ac.uk\/critical-chains\/?page_id=290"},"modified":"2019-09-05T09:54:54","modified_gmt":"2019-09-05T08:54:54","slug":"partner-6","status":"publish","type":"page","link":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/","title":{"rendered":"Partner 6:"},"content":{"rendered":"<h3><a href=\"https:\/\/guardtime.com\">Guardtime AS<\/a><\/h3>\n<h4><strong>Relevant Expertise<\/strong><\/h4>\n<p>Guardtime AS is a systems engineering company, engaged in R&amp;D in hash-based cryptography, building core technology and value-added solutions that provide real-time situational awareness into the integrity state of electronic systems and data. Guardtime is one of the world\u2019s leading blockchain technology company. Guardtime\u2019s blockchain-based Keyless Signature infrastructure has been in production since 2012.<\/p>\n<p>The Guardtime core technology \u2013 the KSI\u00ae blockchain stack \u2013 enables its customers to know, and be able to forensically prove, whether any part of their systems or stored electronic data and logs has been changed, either by insiders, external actors, or technical malfunction. KSI blockchain, operating in production since 2007, provides a mathematically tamper-evident audit trail and evidence for post-incident investigations, establishing who, what and when with forensic precision.<\/p>\n<h4><strong>Responsibilities<\/strong><\/h4>\n<p>Guardtime will be the main developer for the blockchain-based data integrity layer, contributing to BCaaS, secure contracting, digital identities, backend and frontend applications as well as other aspects of the project such requirements engineering, system integration and evaluation<\/p>\n<h4><strong>Responsible Staff<\/strong><\/h4>\n<p>Rando Kulla, Risto Laanoja, Tuuli L\u00f5hmus<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guardtime AS Relevant Expertise Guardtime AS is a systems engineering company, engaged in R&amp;D in hash-based cryptography, building core technology and value-added solutions that provide real-time situational awareness into the&#8230;<a class=\"read-more\" href=\"&#104;&#116;&#116;&#112;&#115;&#58;&#47;&#47;&#114;&#101;&#115;&#101;&#97;&#114;&#99;&#104;&#46;&#114;&#101;&#97;&#100;&#105;&#110;&#103;&#46;&#97;&#99;&#46;&#117;&#107;&#47;&#99;&#114;&#105;&#116;&#105;&#99;&#97;&#108;&#45;&#99;&#104;&#97;&#105;&#110;&#115;&#47;&#99;&#111;&#110;&#115;&#111;&#114;&#116;&#105;&#117;&#109;&#47;&#112;&#97;&#114;&#116;&#110;&#101;&#114;&#45;&#54;&#47;\">Read More ><\/a><\/p>\n","protected":false},"author":219,"featured_media":0,"parent":217,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"__cvm_playback_settings":[],"__cvm_video_id":"","footnotes":""},"coauthors":[6],"class_list":["post-290","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Partner 6: - Critical Chains<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Partner 6: - Critical Chains\" \/>\n<meta property=\"og:description\" content=\"Guardtime AS Relevant Expertise Guardtime AS is a systems engineering company, engaged in R&amp;D in hash-based cryptography, building core technology and value-added solutions that provide real-time situational awareness into the...Read More &gt;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/\" \/>\n<meta property=\"og:site_name\" content=\"Critical Chains\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-05T08:54:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/\",\"url\":\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/\",\"name\":\"Partner 6: - Critical Chains\",\"isPartOf\":{\"@id\":\"https:\/\/research.reading.ac.uk\/critical-chains\/#website\"},\"datePublished\":\"2019-09-02T12:58:47+00:00\",\"dateModified\":\"2019-09-05T08:54:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/research.reading.ac.uk\/critical-chains\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consortium\",\"item\":\"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Partner 6:\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/research.reading.ac.uk\/critical-chains\/#website\",\"url\":\"https:\/\/research.reading.ac.uk\/critical-chains\/\",\"name\":\"Critical Chains\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/research.reading.ac.uk\/critical-chains\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Partner 6: - Critical Chains","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/","og_locale":"en_GB","og_type":"article","og_title":"Partner 6: - Critical Chains","og_description":"Guardtime AS Relevant Expertise Guardtime AS is a systems engineering company, engaged in R&amp;D in hash-based cryptography, building core technology and value-added solutions that provide real-time situational awareness into the...Read More >","og_url":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/","og_site_name":"Critical Chains","article_modified_time":"2019-09-05T08:54:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/","url":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/","name":"Partner 6: - Critical Chains","isPartOf":{"@id":"https:\/\/research.reading.ac.uk\/critical-chains\/#website"},"datePublished":"2019-09-02T12:58:47+00:00","dateModified":"2019-09-05T08:54:54+00:00","breadcrumb":{"@id":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/partner-6\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.reading.ac.uk\/critical-chains\/"},{"@type":"ListItem","position":2,"name":"Consortium","item":"https:\/\/research.reading.ac.uk\/critical-chains\/consortium\/"},{"@type":"ListItem","position":3,"name":"Partner 6:"}]},{"@type":"WebSite","@id":"https:\/\/research.reading.ac.uk\/critical-chains\/#website","url":"https:\/\/research.reading.ac.uk\/critical-chains\/","name":"Critical Chains","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.reading.ac.uk\/critical-chains\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/pages\/290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":3,"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/pages\/290\/revisions"}],"predecessor-version":[{"id":363,"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/pages\/290\/revisions\/363"}],"up":[{"embeddable":true,"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/pages\/217"}],"wp:attachment":[{"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/research.reading.ac.uk\/critical-chains\/wp-json\/wp\/v2\/coauthors?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}